phishing

Zero-day in Salesforce email services exploited in targeted Facebook phishing campaignZero-day in Salesforce email services exploited in targeted Facebook phishing campaign

Zero-day in Salesforce email services exploited in targeted Facebook phishing campaign

Experts spotted a spear-phishing Facebook campaign exploiting a zero-day vulnerability in Salesforce email services. Researchers from Guardio Labs uncovered a…

2 years ago
WormGPT, the generative AI tool to launch sophisticated BEC attacksWormGPT, the generative AI tool to launch sophisticated BEC attacks

WormGPT, the generative AI tool to launch sophisticated BEC attacks

The WormGPT case: How Generative artificial intelligence (AI) can improve the capabilities of cybercriminals and allows them to launch sophisticated…

2 years ago
Microsoft warns of multi-stage AiTM phishing and BEC attacksMicrosoft warns of multi-stage AiTM phishing and BEC attacks

Microsoft warns of multi-stage AiTM phishing and BEC attacks

Microsoft researchers warn of banking adversary-in-the-middle (AitM) phishing and BEC attacks targeting banking and financial organizations. Microsoft discovered multi-stage adversary-in-the-middle…

2 years ago
Beware of the new phishing technique “file archiver in the browser” that exploits zip domainsBeware of the new phishing technique “file archiver in the browser” that exploits zip domains

Beware of the new phishing technique “file archiver in the browser” that exploits zip domains

"file archiver in the browser" is a new phishing technique that can be exploited by phishers when victims visit a…

2 years ago
Attackers use encrypted RPMSG messages in Microsoft 365 targeted phishing attacksAttackers use encrypted RPMSG messages in Microsoft 365 targeted phishing attacks

Attackers use encrypted RPMSG messages in Microsoft 365 targeted phishing attacks

Experts warn of phishing attacks that are combining the use of compromised Microsoft 365 accounts and .rpmsg encrypted emails. Trustwave…

2 years ago
Russia-linked APT28 uses fake Windows Update instructions to target Ukraine govt bodiesRussia-linked APT28 uses fake Windows Update instructions to target Ukraine govt bodies

Russia-linked APT28 uses fake Windows Update instructions to target Ukraine govt bodies

CERT-UA warns of a spear-phishing campaign conducted by APT28 group targeting Ukrainian government bodies with fake ‘Windows Update’ guides. Russia-linked…

2 years ago
Intro to phishing: simulating attacks to build resiliencyIntro to phishing: simulating attacks to build resiliency

Intro to phishing: simulating attacks to build resiliency

Phishing attacks are a major threat to organizations, they remain a perennial choice of cybercriminals when it comes to hacking…

2 years ago
Phishers migrate to TelegramPhishers migrate to Telegram

Phishers migrate to Telegram

Experts warn that Telegram is becoming a privileged platform for phishers that use it to automate their activities and for…

2 years ago
DEV-1101 AiTM phishing kit is fueling large-scale phishing campaignsDEV-1101 AiTM phishing kit is fueling large-scale phishing campaigns

DEV-1101 AiTM phishing kit is fueling large-scale phishing campaigns

Microsoft warns of large-scale phishing attacks orchestrated with an open-source adversary-in-the-middle (AiTM) phishing kit available in the cybercrime ecosystem Adversary-in-the-middle…

2 years ago
New TA886 group targets companies with custom Screenshotter malwareNew TA886 group targets companies with custom Screenshotter malware

New TA886 group targets companies with custom Screenshotter malware

The TA886 hacking group targets organizations in the United States and Germany with new spyware tracked as Screenshotter. A recently…

2 years ago